Little Dog Tech Logo
CALL US
515-422-1995
5946 Ashworth Rd.
West Des Moines, IA 50266
  • Home
  • Remote Support
  • Services
    • Residential Services
    • Business Services
  • Pricing
  • About
  • Reviews
  • Contact Us
  • Blog
  • Partners

3 Essential Steps Before You Fire an Employee

April 23, 2018 by Paul Schwegler

Your employees need access to your various business accounts so they can do their job, but what happens to those passwords when you fire them? Nobody likes to think of firing their employees, or why you’d need to, but nonetheless it’s a responsibility every business owner must face at some point. While your accounts team will no doubt be on top of stopping their paychecks, it’s important to take the same proactive stance to strip their system access.

Most of the time, the former employee leaves under good terms and you’ll wish them well. If you’re lucky, they’ll even manage hand-over to their replacement so your productivity losses are minimal. Other employees may leave your business reluctantly or in a storm of anger and suspicion. While you’ll have very different feelings about the two scenarios, the risk to your business remains high until action is taken. Here are 3 steps you can take to protect your business from retaliation and other password-related disasters.

Set your business up for success

There are many different ways to set up your business in terms of technology, but there is also a right way. Certain considerations need to be made when choosing how your employees interact with your data and systems. Access to important information should NOT be dependant on one certain person and that only they may know. For instance, are they using company provided computers or their own? They may not let you get your data off a personal computer if they leave on bad terms. Or, are they allowed to put e-mail on their phone, and if so how can that be removed if the device is not available to access? Also, something as simple as accessing a vendor account (ie Staples, Amazon, Mediacom, or Centurylink) after they have left can be very difficult if your employee was using a personal e-mail address. Have a plan and policies in place to prevent these sorts of problems and the departure of an employee will MUCH easier and less damaging to the company.

Have a plan ready

I know from experience, a termination can happen at the worst times. Then, you are scrambling to try to remember what needs to be done in what order…all while trying to handle the daily business of that employee plus your own. You need to have a termination plan figured out and ready. How do you change passwords? What services do you need to stop first? Do they have a personal device that you need to remove company e-mail from? All of this needs to be written out in a document that you can use to handle the situation quickly and efficiently, without missing a step in the heat of the moment.

Limit access to a need-to-know basis

You might be surprised how often a new employee is presented the entire business on a platter when their actual job requires little more than a computer login. Accounts, strategy, customer details, industry secrets…all those sensitive aspects of your business that have made it a success – exposed. A better policy is to limit access to only what the employee needs to do their job. Rather than view it as a lack of trust, your employees will appreciate the care you’ve taken to protect your business (and their job). It also helps keeps them from being overwhelmed, confused or tempted if the situation ever turns sour. Likewise, take a few moments to delete old or temporary accounts that are no longer required, as you never know when a hacker or disgruntled employee will squeeze through the gaps.

Change passwords fast

On average, it takes at least a week before passwords are changed after an employee is fired, if at all. Unfortunately, this is the one type of delay your business can’t afford. In 2017, an ex-employee from the American College of Education held their entire email system to ransom for $200,000 after an unhappy exit. Stories of others stealing client databases are also common, especially as they leave to start their own business or work for a competitor. It’s not just full-time employees either, contract and part-time employees such as social media managers and customer support email specialists often have access to more of your business than you might imagine. Recent rulings make it easier for business owners to prosecute former employees who access their systems, however as we know, it only takes seconds to login and wreak absolute havoc. Knowing you can force those bad eggs into a lengthy court case is poor comfort considering the extent of damage you’ll likely endure. The best option is to change passwords fast – even before your employee knows they’re fired. This lessens the chance of revenge attacks and opportunistic access. Also, make sure that accounts are set up with recovery addresses that you control. I have seen very important vendor accounts locked after the employee left, even though the password was changed because the employee had their personal e-mail address as the password recovery address.

Use a password manager

If you have good password manager like LastPass, reducing your risk becomes mostly automated. You’ll be able to keep your logins in a central vault that only you can see, and share based on business roles/need. There’s even an option to share passwords without letting employees see them in plain-text. Instead of writing passwords down somewhere and manually entering them each time, they’ll be able to connect securely with a click. Plus, you can revoke the share at any time. If their role changes or they’re fired, you can use the dashboard to see who is having access to what and add/revoke at will. If you’re not sure what that employee has been up to, you can also generate reports of their history.

Filed Under: Security, Tips Tagged With: employee technology, fire employee, layoff employee, technology planning

Share:

How Refurbished Computers Save You a Bunch (and Get You a Better System)

April 16, 2018 by Paul Schwegler

Refurbished computers are almost like an insider secret – you can get great system specs for a fraction of the price. It’s how many families are meeting their back to school needs and upgrading their old systems, complete with warranty.

There’s one hot tip these people know: a refurb is NOT the same as used. You’re right to avoid those 2nd hand computers you see on Craigslist or LetGo because there’s a reason that person is selling it! It’s probably slowed to a crawl, making weird noises or flat out broken in a way you’d never discover until too late. Refurbished computers are the complete opposite. They’re computers that have been given a new life, usually with a comprehensive repair, a thorough inspection, and a fresh installation of Windows on a tested and verified hard drive.

Quite often, refurbished computers start their life as business machines, built to the latest specs with business-grade components. When the budget or lease says ‘replace the computers’, that’s what the business does, whether the computers need it or not. There’s nothing wrong with them and they’ve likely been babysat by a corporate IT department who kept them in perfect condition every day. These are great machines that are still plenty fast for home use, both desktops and laptops. Plus, because business-grade components are more durable than the consumer ones, the entire system has been built to last longer and perform better, often up to several years without a problem. Rather than send these impressive machines to landfill, we check and replace necessary components and re-install a clean operating system. Next, we put them through a stack of verification tests, then pack them up ready for their new home. When you talk to us about buying one, we’ll always make sure you get a system that not only keeps up with your needs now, but gives you breathing space for the next few years too.

What are the benefits?

  • You save a LOT of money: You get yourself a great computer that’s been set up and checked over by an expert technician, for significantly less than the cost of buying new. Add in the fact that when you score a refurbished business computer you’re also getting more durable, higher-quality components that will last you for years longer than the off-the-shelf consumer model, it’s a clear win.
  • Covered by warranty: A warranty is always included with our refurbished computers, giving you value plus peace of mind. It’s your guarantee that buying refurbished was a great decision. Problems are extremely rare since your computer has been through stringent checks, but if anything pops up that’s giving you trouble, we’ll fix it fast. Forget the delays and hoop jumping you might get with your other warranties, we stand by ours with rapid action.
  • You’re saving the environment: Fewer machines end up in landfill and fewer resources are used for unnecessary manufacturing. When you consider each computer requires a certain amount of precious metals to be mined, plastics to be created, packaging used, and all the associated effects of shipping, refurbishment is the right choice for the future. While you might not personally see the environmental impact of your decision to buy refurbished, rest assured the planet appreciates it!

Are they reliable?

Some people think that refurbished computers are more likely to break, when in truth, in some cases they’re actually more reliable than brand new. Manufacturers have an expected failure rate, a percentage of computers that go straight from the factory to buyers who discover their expensive new system is dead-on-arrival or breaks within weeks. A refurbished computer has already stood the test of time and it performed without missing a beat. By the time it’s gone through our checks and repairs (both required and pre-emptive), a refurbished computer is better than new.

Filed Under: Maintenance, Tips Tagged With: refurbished

Share:

4 Advantages of Managed IT Over In-House IT

April 9, 2018 by Paul Schwegler

It’s tempting to hire an in-house IT technician to take care of your network and set them up with a cozy office just down the hall, but is it the right decision for your business? If you’re like most businesses, you’re always on the lookout for ways to save money while improving results. Sometimes this means expanding your staff to include a team of tech specialists at your beck and call, but this can often be an unnecessary expense that leaves you with highly paid employees twiddling their thumbs all day. For SMEs who are looking for the best of both worlds, we recommend Managed IT services.

Put simply, Managed IT is our solution which gives you that team of specialist technicians and network experts, without the ‘quick, look busy’ element – and at a fraction of the cost. Naturally, you’d rather see your IT budget working to support your growth and kept as low as possible. That’s our focus too, and why we don’t simply maintain and repair your systems, we proactively monitor to avoid downtime and work with you to ensure your IT increases productivity and efficiency. Whether you already have in-house IT and are auditing the value, or are curious about what having IT support might be like for your business, we’ve put together a few factors to consider before making your choice:

Availability: Most employees work 9-5, but what happens if something goes wrong with your systems outside these hours? Your in-house technician won’t appreciate being woken at 1am and called in for emergency repairs. It’s more likely that they simply won’t answer the call (or hear it), or if they do, expect some hefty contract renegotiation come 9am. Managed IT is very different as we can better handle problems after hours and have support technicians available to help. We know that every minute of downtime is affecting your revenue, plus your business reputation, so we prioritize getting your systems up and running asap. That being said, with our Managed IT these types of disasters are rarer as we’re constantly monitoring and correcting problems before they occur.

Total cost: One of the things that may attract you to having an in-house technician is the cost. But while you may be able to pay them a lower hourly rate, there are extra costs like hiring, training, an office space, healthcare benefits, and retirement. After all, you’re not going to be able to pay a good systems administrator $12/hr. Once you start adding up the cost of an in-house technician, you might find it’s eating up your IT budget and leaving you scrambling to fill gaps you didn’t expect. Upgrades get delayed, opportunities missed, and IT expenses become a sore point. In comparison, Managed IT is one fixed monthly rate delivering enormous value, including access to specialists across all software applications and technology.

Ongoing Training: Putting aside the fact your technician will often spend entire weeks away upgrading their skills and leaving you scrambling for support while they’re gone, those training costs quickly add up. With a salaried technician, you’ll need to pay all ongoing training and certification costs plus travel costs for industry conferences. We know how important it is to remain current, certified, and skilled in new technologies. So, we spend the money to invest in ourselves so we can serve you better. We’re part of industry related communities and attend multiple conferences each year, all at our own expense.

Different goals: For most employees, a higher wage is the goal and many will job-hop to achieve that. A salaried tech may be looking for the first opportunity to leave and get paid more, often leveraging all the training you’ve just provided. In these modern times, switching jobs regularly is expected, with an average of only 3 years in each position. Considering how much it cost your business to acquire, train and upskill your technician, 3 years is an unreasonable ROI. Our goals couldn’t be more different – we only aim to keep you a happy customer for as long as we can!

In the end, your business needs to find the right balance between profit and expertise. When you partner with our Managed IT, you’re securing availability, ever-increasing expertise and commitment to your success. We work closely with you to provide the very best support and protect you costly disasters, taking preemptive action to keep you safe and operational. There’s no doubt Managed IT is a better decision than hiring an in-house technician, and we’d be delighted to prove it to you.

Filed Under: Uncategorized Tagged With: it support, managed services

Share:

3 Internet Habits To Keep Kids Smart and Safe

April 2, 2018 by Paul Schwegler

How can you make the internet a safer place for your children? It’s a common concern as all parents want their kids to be protected and happy whenever they go online. It’s relatively easy to supervise and monitor the very young ones as they stare delightedly at the NickJr or PBSKids site, but the risks increase greatly as kids get older and more independent. As a father of three boys, I have had to start thinking about this very concern. Hopefully, this post will help others in keeping their little ones safe online.

You’ve probably heard the term ‘cyber safety’ before, but safe internet usage goes beyond reminding them not to talk to strangers. With the evolution of the internet and the way it’s now woven seamlessly into our lives, the focus needs to be on ingrained habits. That means ensuring your children have the tools and predefined responses to online events so that no matter what happens, they’re not placing themselves (or your family) at risk. I’ll start with a few general ideas and concepts to teach and then finish with some actual methods to help protect your kids and computers.

Downloads are a no-go

Most kids can’t tell the difference between a legitimate download and a scam/malicious link. It’s not their fault, the online world is full of things that will trick even the savviest adult. The difference is that kids tend not to take that extra moment to check exactly where that link is pointing, question whether it’s too good to be true, or even read what they’re agreeing to. They want to get back to what they were doing, and if something pops up, their first instinct is to click ‘yes’ – purely so it goes away. Unfortunately, that single ‘yes’ may have just opened the doors to malware and viruses that will ruin their computer. Set a family rule that they need to ask permission for all downloads (and an adult will check it first), and to never click a popup. When you’re called over to give download permission or check a popup, talk through exactly what you’re checking and why. As your child matures, get them involved in this process so their safe habits extend outside the home.

Critical thinking is a must

Most youngsters think the internet is a magical place and can’t imagine their life without it. To them, the internet is on the same level as oxygen! With that acceptance though, comes unwavering trust that the internet would never lie to them, never trick them and never hurt them. While we adults know better, it’s only because we already view the internet with a certain level of distrust. The best way to keep kids safe is to teach them to approach every aspect of the internet with critical thinking. That includes teaching them to question the motives of other people online. Is that person really a kid? What do they really want? Unfortunately, all kids do need to be aware that predators use the internet to target and lure children. Ensure your children tell you immediately if a stranger makes contact. Along with this stranger danger, teach them to identify what marks something as suspicious, and what they should avoid. If they come across anything inappropriate, they should shut down the computer and come straight to you.

The internet is forever

Kids have an overwhelming drive to contribute to the internet, they don’t think twice about recording a video, jumping in a chat room or onto social media. The world really is their playground! But what they don’t understand until they’ve been burned, is that anything they upload, write or say is on the internet forever. Even if they delete it or use a platform where content self-erases, someone can still screenshot and send it right back out. Many cyber-bullying cases are based on this exact type of blow-back. Once your kids know that everything they post is permanent, they’ll be more likely to pause and think.

OK, now that we have identified the dangers, how can you actually help prevent this from happening? No matter how much you tell your kids not to click on a link, I know from experience that they aren’t always going to listen! While there are some things we can’t prevent, there are still steps we can take to help.

Lock it down!

There is a hard rule when it comes to the relationship between security and convenience. The more you have of one, the less you have of the other. Most modern systems try their best to strike a balance between the two but often err on the side on convenience. Take Microsoft Windows for example. After 15 years of historically being the LEAST secure operating system, it still defaults to your user account having full administrative permissions! This means that you can install any program and change any setting with only the click of the ‘OK’ button. Kids aren’t going to know what this means, they are going to click OK…and now you have a virus. What can you do about this?

  • Make a new Windows account for your kids that does NOT have administrator rights. Then, put a password on your account that they don’t know. Now, whenever they are prompted to install something or change a setting they will be unable to continue without you typing in the password. Of course, this means that you need to not leave your computer unlocked all of the time. So, turn the screensaver on and make it require a password on wake. This way, your kids can instead log into their account and do what they need to do.
  • Install a parental control application. There are a plethora of parental control programs out there that claim to keep your kids safe. And for the most part, they do effectively keep the kids out of things they shouldn’t be in. However, don’t for a second think that there aren’t instructions on how to bypass that program freely available online! Use these as a stopgap, but don’t put all of your trust into them. NOTE: I have limited experience with these applications, so I can’t really vouch for one. They all come with their benefits and drawbacks so make sure to try it before buying.
  • Get rid of Windows. What I have done with my boys is eliminate the whole risk of Windows to begin with. Instead, I purchased inexpensive Chromebooks for each of them. These allow fully compatible access to the internet (which is filtered as I will cover soon) but have no vulnerabilities to infections. They are cheap, durable, and last forever on battery. Also, they are familiar to children because most schools have Chromebooks in the classrooms these days. They can’t run Windows apps, but to be honest that doesn’t really matter as pretty much everything they do these days is online or available as a Chrome App.

OK, but what about porn?

No longer do kids have to scrummage through the basement for their dad’s box of playboys. A simple Google image search can turn up stuff that no kid should be exposed to. What do we do about this? Well, nothing is perfect, but by far the most effective thing I have found is to use a maintained filtering service on your entire home network. This way, even if your child is using a device that does not have parental control software they are protected. The one I use at home is OpenDNS.

The free home version does take a little setting up, but once in place, it allows you to selectively block any of 58 categories of content. It also can help protect against malware, botnets, and phishing attacks all for free! If this setup is a little past your pay grade, we can do this for you or you can utilize the ‘Family Shield’ version of the service which is preconfigured to block adult content. All you need to do is set your main router’s DNS to 208.67.222.123 and 208.67.220.123. Click the previous link for instructions.

That all being said it is possible to override OpenDNS or any other filter if you know what you are doing. A mobile device on cellular data or just at a friends house will still allow them to visit any site. But, these methods should suffice for the younger kids.

Filed Under: Security, Tips Tagged With: dns, filtering, kids, Safety

Share:

Are You Backing Up the Right Way?

March 26, 2018 by Paul Schwegler

The 31st of March is World Backup day and it’s a great time to put a backup in place. Businesses are losing huge amounts of data every day, purely because ‘backing up’ is stuck at the bottom of their to-do list. So this is your reminder, that even if you only do this once a year when the calendar tells you to, it’s time to flip that to-do list and make it happen! But how? What’s the easiest, most effective way for your business to backup?

You’ve probably heard of file backup by a number of names: Cloud Sync, Cloud Backup or Cloud Storage. They’re all similar enough to be confusing and meaningless enough to be anything. Here’s what they mean and which one you need today.

Cloud Sync

Google Drive, Dropbox, iCloud, etc are services that sync up with a single folder on your computer. They mirror it. When a file changes in one, the sync service rushes to change it on your computer too, so they are always the same. Cloud Sync services are hugely flexible for remote employees, or even those squeezing in a few quick tasks while riding the train to work. They’re ridiculously easy to use, require no training, and the free tiers are enough for most individuals. This all sounds amazing, right? Except…when things go wrong, they go wrong big time. Accidentally deleting a file means it disappears from the Cloud Sync drive – almost immediately. Overwriting a file does the same thing, and if an employee makes edits to the wrong file, then those edits are there to stay. If disaster strikes and your local copy becomes corrupted (or ransomed), well you guessed it, the corruption is uploaded too. While some Cloud Sync services now offer a 30-day backup option, you may not notice the file was missing within this time and even if you do, restoring multiple old versions of files is VERY time-consuming.

Cloud Sync services are fantastic for productivity and accessing files on the go, but they simply can’t be relied on as your backup tech.

Cloud Storage

Amazon S3, Microsoft Azure, etc are massive buildings full of storage drives that work just like your local hard drive, except you access them securely via the internet. In fact, when you use a cloud sync app like Dropbox, they’re actually sending your data to one of these locations. While the sync services have a constant back and forth connection between the storage center and your folder, and as explained above aren’t good for backup, you have another option. You can access cloud storage on a per/GB basis yourself and upload your entire backup as desired. It won’t update with changes on your local network, but it will be safe from disaster. When you need to retrieve a file, you simply login and download it.

Your backed up data is secure, protected against disaster, and always available to you. However, because it relies on you/your employee to handle the backup plan and manually take care of the uploads, this is a high-risk solution. Unless your employee is scouring your network each day/week/month for changes to files and uploading them with fervent dedication, chances are this plan won’t work. We recommend an automated or outsourced solution so you can get on with business AND be protected.

Cloud Backup

Mozy, Carbonite, Backblaze backup, Crashplan, or our custom monitored Managed Online Backup may or may not be names you’ve heard before, but they work in the background to monitor changes to files on your computer or network and make sure you’re backed up. You can roll back individual files or whole drives, and even select from earlier backups, not just one. Like sync services, they use cloud storage centers with extra-high security and redundancy so that your data is always there when you need it. Even better, neither you nor your employees need to worry about when it was last done.

The One You Need

Let’s take a moment to talk planning. We recommend starting with the 3-2-1 strategy. This means having 3 copies in total, 2 of them locally such as on your computer (the working copy), an external drive (the easy-to-reach backup copy), and another offsite in the cloud (in case something catastrophic happens). Using this strategy keeps your business operating when data disasters occur and is an investment in your uptime. We can help get you set up with the 3-2-1 method, including selecting the best cloud service for your needs. If you’re looking for a more scalable, cost-effective solution that gives the utmost peace of mind, ask about our managed backups service.

Filed Under: Backup, Cloud, Tips Tagged With: backblaze, carbonite, cloud backup, cloud storage, dropbox, google drive, icloud, mozy

Share:

How to Maintain Your Computer (Without Lifting a Finger!)

March 19, 2018 by Paul Schwegler

For a device that’s supposed to make life easier, computers sure do involve a lot of work! There’s so much to keep track of that it’s no wonder most people push ahead and forget the routine maintenance until something breaks. Of course, the problem with being reactive is the damage is already done. Photos and files get lost forever in a crash, and information gets stolen in a hack…by then it’s far too late. It’s a bit like closing the gate after the horses have already fled. This is where proactive people come out on top. Thousands upon thousands of homes around the world are using managed services to put computer problems firmly behind them. It’s a done-for-you maintenance program we offer, and here’s why it’s the best choice.

You’re always up to date. It seems like every second day there’s some new and urgent update waiting to be installed. Whether they’re patching security flaws or adding new features, they seem endless. Sometimes, it goes beyond inconvenient, it gets overwhelming! Even if they do install automatically, they tend to do it at the worst possible moment, leaving you to wait up to 30 minutes when all you wanted to do was quickly check your email. Using our special managed services software, we can make sure your computer’s updates are all finished and done – before you sit down to use it. As part of our service, we also make sure all updates are compatible not just with your hardware, but also with your other software. After all, updates are supposed to make your experience more secure and more enjoyable!

You’ve got super anti-virus. The best anti-virus is the one that’s up-to-date and running, yet you’d be surprised how many people switch it off or never let it update. While you might be in the habit of scanning files and browsing safely, others in your home might not have the same priorities. Having managed services ensures your anti-virus is always running and dealing with any viruses it finds. As soon as a new virus becomes known, we make sure your system is actively protected against it. We also monitor for cyber-attacks and can alert you before they become a problem.

Your hardware stays healthy. While a reactive person is always suddenly stuck without a computer when hardware fails, proactive people with managed services have already had the problem fixed. Our special software monitors the health of your hardware, eg, your hard drive, looking for early warning signs of failure. If detected, we can let you know in advance. This means you’re able to get it repaired at your convenience, making sure no files are lost and no other hardware is damaged in a domino failure.

You never miss a backup. The worst part of a crash or hack isn’t the financial cost, it’s losing your files forever. Many people have their entire collection of photos stored on their computer, plus important family files, most of which can never be replaced or recreated. Whether it’s a report just created, a recipe handed down for generations or a novel you’ve been working on for longer than you’d care to admit, managed services ensure your backup is working correctly. Backed up files are ready to go when you are, and losing files to corruption, failure or theft is a thing of the past.

Support is a phone call away. Just got a new printer and it won’t play nice? Got a weird error popping up? Your laptop won’t talk to the Wi-Fi? Our remote support team can help with whatever technology issue has been bugging you and wasting your time. No nonsense advice is just a phone call away, and our team can remotely connect to diagnose and fix many problems. This means you can likely skip the cord shuffle and carting your computer into the shop, and still get your most pressing computer issues fixed.

You’re always optimized. Whether your computer is actively playing up or not, our monitoring service can keep in touch with your event logs, services and processes and look out for anything that needs correction. This means we’re effectively stopping problems before they get to you, making sure that when you sit down to use your computer, it’s doing exactly what you want.

Filed Under: Backup, Cloud, Maintenance, Tips Tagged With: maintenance, managed antivirus, managed backup, managed services

Share:

Why Spam is a Small Business Nightmare

March 12, 2018 by Paul Schwegler

15 years after the world united to crack down on spam emails, we’re still struggling with overloaded inboxes. All that unwanted email continues to flood the internet, much of it targeted to small businesses, and the impact goes wider than you might think. Here’s the full breakdown of how modern spam works and how it’s hurting your business.

What is spam? Generally speaking, spam is any unwanted message that lands in your email, comes via text, social media messaging, or other communication platforms. It might be sent to your main business account, eg your ‘contact us’ email, or directly to your employees. Most of the time, spam is annoying but relatively innocent messages from another business inviting you to buy/do/see something. They’re newsletters (!), reminders, invitations, sales pitches, etc. You may know the sender and have a previous relationship with them, or they might be a complete stranger. Occasionally, spam may even be part of a cyber attack.

Why you’re getting spammed. Maybe you or your employee signed up for a newsletter or bought a $1 raffle ticket to win a car. Perhaps you got onto the mailing list accidentally after enquiring about a product, not knowing that simply getting a brochure sent through would trigger a spam-avalanche. Often there’s fine print that says they’ll not only use your details to send you their marketing, but they’ll share your details with 3rd parties so they can send you messages too. That single email address can be passed around the internet like wildfire, and before you know it, you’re buried under spam. Sometimes, and more than we’d like to think, your details are found illicitly, perhaps through a hacked website for example, like the recent LinkedIn or Yahoo leak. More often though, your email is simply collected by a computer ‘scraping’ the internet – scouring forums and websites for plain text or linked emails and selling them as prime spam targets. It’s easy to see how individual office employees receive an average of 120 emails daily, over half of which are spam!

More than annoying. We all know spam is annoying, but did you know it’s also resource hungry? Your employees are spending hours each week sorting their email, assessing each one for relevance and deleting the spam. Too often, legitimate emails from clients and customers get caught up and are accidentally deleted. Add in the temptation to read the more interesting spam emails and productivity drops to zero. On the other side of the business, your email server might be dedicating storage and processing power to spam emails, occasionally to the point where inboxes get full and real mail is bouncing out. While most spam is simply an unwanted newsletter or sale notice, there’s also the risk that any links may be a cyber-attack in disguise. After all, one click is all it takes to open the door to viruses, ransomware, phishing or other security emergencies.

Spam is a HUGE vector for Infections. Past being just annoying and wasting your time, e-mail spam has become a very effective vector for spreading malware or otherwise stealing information. You may be aware that you shouldn’t open unsolicited attachments, but that is not the only way to cause problems. Lately, I have seen a lot of messages that contain no malware, and don’t even link to a virus. This way, they can’t even be caught by spam or virus scanners. What they do however is take you to a fake login site like Facebook or Google that then asks for your credentials to log in and see a shared document…These can look very convincing but DON’T FALL FOR IT!

How to stop the spam. The 2003 Can Spam Act (a global set of anti-spam laws) requires all marketers to follow certain rules, like not adding people to mailing lists without permission, and always including an ‘unsubscribe’ link. So firstly, make sure you’re not accidentally giving people permission to email you – check the fine print or privacy policy when you sign up for a service. Next, look for the unsubscribe link at the bottom of the email. If the message is from a reputable company (Amazon, Facebook, Little Dog Tech…), it is best to use this unsubscribe link rather than mark it as spam. Unfortunately, not all of them include the link, or they hide it somewhere impossible to see. In that case, mark it as spam! I practice this daily and as a result only 1 or 2 spam messages a day.

Some other advice for avoiding spam:

  • Business e-mail should NOT be a free service such as Hotmail, Yahoo, AOL, or even Google. Not only are they not as secure as most businesses need, those are known domains and regularly attacked and spammed. If you set up a custom domain (like littledogtech.com), you are instantly creating an address that is completely unknown and new. Spammers can’t send mail to a domain they don’t know about! Setting up a custom domain is not as hard or expensive as it used to be.
  • Once you have that custom domain, format your business e-mail addresses to NOT have common names like ‘admin’ or ‘sales’ or ‘support’. These are easily guessed and added to lists. Also, include more than just the first name of your employees to make the address harder to guess. Use Robert.Johnson@company.com rather than bob@company.com.
  • Utilize a 3rd party mail filtering service to scan and categorize all mail for viruses or spammy content BEFORE it reaches your inbox. These systems can also filter out potential phishing messages by recognizing that something that may look like it is coming from a co-worker is not. Our clients that are on such a system enjoy GREATLY reduced spam in their inbox.

Filed Under: Cloud, Security, Tips Tagged With: e-mail, Malware, spam

Share:

5 Signs Your Computer is Crying Out for Repair

March 5, 2018 by Paul Schwegler

It’s pretty obvious when your computer is already broken, but how do you know when it’s about to break? Even before it falls into a heap and refuses to turn on, or flashes big messages about how your files are now encrypted, you’ll be given multiple hints that something is wrong. Here are the common signs your computer needs repair, sooner rather than later.

  1. It’s running slow. Most people assume their computer is running slow because it’s getting older, but it could actually be a variety of reasons. A program behaving badly, a virus, overheating or even a failing hard drive can all cause a massive slow down. You might only notice it when booting up or starting a program, or the problem may have taken hold to the extent that even moving your mouse becomes torture. Sometimes the slow speed is simply due to some newer software that your hardware can’t keep up with.
  2. Your system is running hot. A very common sign with laptops, running hot can be both the sign and cause of damage. Computers have fans to blow out hot air so they can cool off their internal components. At the same time, fresh air is drawn in through vents to create an effective cooling system. Unfortunately, just about every vent in a computer can quickly become clogged with dust and pet fur, essentially choking off the circulation and leaving components to overheat. Desktop computers have more space inside to circulate air, but you’ll still need to keep their vents clear. You’ll know your computer running too hot if your system shuts down frequently (safety cutout), the fan is loud, or your laptop is too hot to use on your lap.
  3. Blue Screens of Death are everywhere. A classic Windows error, this is quite literally a blue screen that covers your view. The system will still be running, but something has gone wrong. You’ll be shown some text and an error code, often with Windows suggesting a restart. If a restart fixes your problem, perhaps something didn’t load properly at bootup and your computer had a whoopsie. It’s rare, but it happens. If you’re getting blue screens all the time though, that’s a sign a hardware or software problem needs to be resolved. Your computer will continue to give blue screen errors more and more frequently, so it’s best to take action as soon as you know something’s wrong.Please note, some scammers will present fake blue screens when browsing the web. If the blue screen error you are seeing has a phone number to call, it is NOT REAL! You still have an issue, but not a true blue screen error.
  4. It’s making strange noises. Your computer has a number of moving parts. You’ll know by now which noises it normally makes, from the startup beep to the whirring fan. When your computer starts to make extra noises…that’s when things get interesting. Fans can wear down and screech or grind, hard drives can start clicking, and in emergency cases, you might even hear a zapping noise. None of those are good! Whenever you notice a strange noise, remember your computer parts are all designed to work together and one problem could quickly become many if left unchecked.
  5. It crashes and freezes. If your computer is crashing randomly, restarting without you, or freezing up completely, it’s a sure sign there’s a problem. As annoying as it might be, your computer isn’t doing this to drive you crazy – it just feels that way! You might notice it’s showing other signs from this list too because crashing and freezing are what happens when something isn’t just wrong, it’s terribly wrong. The problem could be almost anything, hardware or software or both, but it’s always fixable. This is simply your computer’s final way of crying out for repair, desperately trying to get your attention and a little TLC. Whatever you do, get it taken care of fast because if you let it go it could turn into a serious problem that may result in lost data.

Filed Under: Maintenance Tagged With: blue screen, BSOD, crash, freeze, Slow Computer

Share:

Is It Worth Having Your Email Server On-Premises?

February 26, 2018 by Paul Schwegler

There’s not a business around who doesn’t use email on a daily basis. Whether for sending internal memos or communicating with clients and customers, email is a core necessity of any modern SMB. What many modern businesses are doing though, is dropping the in-house email server and moving to a cloud solution. Here’s why you should do the same.

Reduced network problems

Your network operates in a delicate balance, and when one piece breaks chaos soon follows. Connected systems and processes tend to fail, dropping productivity to flatline levels as all focus shifts away from normal activities. It becomes a mad scramble to get the network up again, especially the email servers. The last thing you want is for all your client/customer emails to bounce back! While it’s good to have confidence in your on-site administrator, the assumption that any crashes will always happen during business hours has caused many regrets and panicked phone calls that could be avoided. When you move to a cloud solution, you’re able to say goodbye to onsite servers and all the accompanying drama, making your remaining infrastructure easier to maintain.

Lower hardware and maintenance costs

Maintaining your exchange servers is no doubt costing a tidy sum from hardware repairs and license fees alone. Add in the cost of scaling your server to keep up with your business growth, and suddenly keeping your email in-house doesn’t make financial sense. Instead, consider what it would be like to have predictable costs for your email hosting that covers everything, including the latest technology and round the clock administration. Many solutions offer on-demand plans, so you only pay for the options you want.

You’re still in control

One of the main arguments for keeping your Exchange server is to make sure you have complete control over your email; you’re able to limit physical access, no 3rd party has access to your critical data, and you always know where your data is. While control may have been the deciding factor in the past, the fact is cloud solutions have evolved so much that these arguments are void. Physical security at one of Microsoft’s data farms, for example, goes far beyond that of your locked server room and digital access is strictly limited to those you specify.

Greater protections

Cloud solutions provide automatic protection against many threats, including fire, power outages, viruses and flood. While your own in-house server has anti-virus running and a backup plan, it’s still incredibly vulnerable. Backups get forgotten, virus definitions don’t get updated in time, and you’re very lucky if your own server can survive fire or flood intact. Moving your email hosting to a cloud solution removes all that risk, usually with an uptime guarantee that lets your business get on with essential tasks. As email is a critical tool for your business, isolating your systems from risk may be one of the best decisions you make all year.

We can help you with your email server needs, call us today at 515-422-1995.

Filed Under: Cloud, Tips Tagged With: cloud mail, hosted exchange, hosted mail, o365, office 365

Share:

Desktop Vs Laptop: Which Is Right For You?

February 19, 2018 by Paul Schwegler

Laptops have become the go-to choice for most people in the market for a new computer. They’re sleek, portable and heavily advertised. But are they the best choice for your needs? Before you buy your next computer, take a look at these considerations – you may discover you’ve been dreaming of a desktop all along!

How portable do you need it to be?

Hands down, laptops are easier to move around than a desktop. You can pick them up, pop them into a backpack and away you go. That doesn’t mean desktops are bolted to the floor, just that they’re not designed to take on holidays or go with you to the local cafe. With that portability though, comes a trade-off: thin and light means your computer performance takes a hit. The more powerful your laptop, the bigger and heavier it is, and you won’t enjoy lugging that weight around all day. If that’s got you leaning towards an ultra-portable, consider this: The smaller and lighter your laptop is, the weaker it is. In fact, some laptops struggle to run the most basic apps. Fortunately, when you do choose a desktop, cloud technology means your data is mobile, even if your main computer isn’t.

What balance of power and price do you need?

The bottom line here is that a desktop will always give you more power for less money. Their larger cases allow for bigger and better components, with more effective systems to avoid overheating. Even the most powerful laptop is going to be hotter than its desktop equivalent, and much noisier too. If you’re using power-hungry software like games or video editing, we recommend choosing a desktop. The heat control alone is worth it as frequently overheated laptops don’t survive long.

Desired screen size

As laptops are designed to be portable, screen sizes are usually small, around 11-15”. Larger, more powerful laptops often go up to 17”. Desktop monitors however, start at 17” and average at 22”. These larger sizes give you more space to work in, options to tile your applications and multi-task, and even sit back and watch an HD (or even 4K) movie. They also allow for nice big text and images, with a better ability to choose the visual experience that suits your needs. If you’re after a large screen size without the actual desktop computer, all-in-one PCs are a great option with many offering impressive screen quality.

Your working comfort

Many people buy a laptop only to get home and find it’s a pain in the neck – literally! The traditional laptop design means you’re always looking down at the screen which can put a strain on your neck. You can try to raise the screen by placing the laptop on a stand, but then the keyboard is out of easy reach. The smaller keyboards and touchpad designs may also leave you more prone to repetitive strain injuries. Many people end up connecting their laptops to external monitors, keyboards and mice, simply so they can work in comfort. Desktop computers on the other hand, allow you to create the perfect working environment for your needs and even cater for other family members. Monitors are usually height adjustable, keyboards and mice are wireless, and you’re able to place the desktop on the floor out of the way. If you’re on your computer for more than short bursts, your body will appreciate you choosing a desktop.

Are you looking for flexibility?

When you choose a laptop computer, it’s like ordering from a set menu. You get this brand, in this design, with these specifications. Changing out parts for repair or upgrade can be difficult and expensive as there’s not a spare inch of space. Some parts are extremely hard to get to, which can turn a simple swap into a dealbreaker. The extra space inside a desktop gives infinite flexibility for upgrades over time and fast repairs. This means you’re able to easily pop in more powerful components for a fraction of the price and extend the life of your computer by years.

Come talk to us about your next computer and we’ll find the right one for you. Call us now at 515-422-1995

Filed Under: Tips Tagged With: desktop, hardware, Laptop, new computer

Share:

  • « Previous Page
  • 1
  • …
  • 13
  • 14
  • 15
  • 16
  • 17
  • …
  • 19
  • Next Page »

Contact Form

Search for Something!

Click to see our BBB Report

FOLLOW US

VISIT US

Privacy Policy

Copyright © 2021 · Little Dog Tech · 5946 Ashworth Rd. , West Des Moines, IA 50266